tongzx / Windows-Server-2003
This is the leaked source code of Windows Server 2003
☆12Updated 4 years ago
Alternatives and similar repositories for Windows-Server-2003:
Users that are interested in Windows-Server-2003 are comparing it to the libraries listed below
- 64 bit monolithic nt-style kernel☆96Updated 3 years ago
- Modify your BSOD!☆36Updated 2 years ago
- An NT-Styled Kernel Clone☆36Updated 2 years ago
- windows_10_shared_source_kit☆39Updated 4 years ago
- Example of using Windows Platform Binary Table (WPBT)☆16Updated last year
- windows_nt_3_5_source_code☆15Updated 4 years ago
- Pure Hex-rays Decompiler Psudocode of various Windows 10 Mobile binaries, No edit have been done to the output, you will need to piece to…☆30Updated 3 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆76Updated 2 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆107Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆64Updated last year
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆51Updated 2 years ago
- The bootloader for the latest versions of Windows NT, Windows 8 to Windows 11.☆20Updated 4 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆27Updated 3 years ago
- The Windows Research Kernel (WRK)☆183Updated 8 years ago
- Another UEFI runtime bootkit☆29Updated last year
- x64 PE-COFF virtualization driven obfuscation engine☆55Updated 2 years ago
- ☆71Updated last year
- ☆27Updated last year
- PoC kernel to usermode injection☆73Updated 11 months ago
- A bunch of architectural headers for i386 and AMD64☆35Updated last year
- WIP PoC for license emulation in Oreans products☆39Updated last year
- Parser for Microsoft Program Database (PDB) files☆75Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆28Updated 2 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆47Updated 2 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- Load vulnerable drivers using iqvw64e.sys hijack☆19Updated last year
- Reverse Engineering☆13Updated 7 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆82Updated last year
- Simplifies the Windows Kernel APIs by making the existing function easier to use, and extends them by creating functions that could possi…☆26Updated 6 months ago